Content Retrieve Update Api
GET /api/content/f62592e0-8f78-46e2-887c-2f52716be127/
{ "id": 4214, "content_customizations": null, "shortcut_customizations": [ { "id": 3510, "created_at": "2022-11-09T13:23:25.595978Z", "updated_at": "2022-11-09T13:23:25.604104Z", "action": "DOWNLOAD", "color": "#FFFFFF", "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/35ee1c336c71499bad0f609be644ca37/download_icon.svg", "additional_data": { "download_url": "https://media.celero.io/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/original_file.pdf" }, "content": 4214 } ], "content_thumbnail": { "original": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails/1.jpg", "high_quality": { "small": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/1.jpg", "medium": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/1_medium.jpg", "large": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/1_large.jpg", "microsite_preview": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/preview.jpg" } }, "edited_pages_metadata_count": { "all_pages_count": 14, "edited_pages_count": 0 }, "version": { "id": 4212, "version_number": 1, "version_details": { "uuid": "f62592e0-8f78-46e2-887c-2f52716be127", "created_at": "2022-11-09T13:23:26.183663Z", "updated_at": "2025-03-23T10:59:20.239364Z", "name": " Cognyte_TL_3_Key_Trends_WP_EN", "is_live": true, "access_control": { "min_stage": "EVERYONE_ALLOWED", "stage_options": { "UNVERIFIED_CONTACT": { "form_preview": "LANDING_PAGE", "form_id": "default" }, "VERIFIED_CONTACT": { "form_preview": "LANDING_PAGE" }, "GDPR_CONSENT": {}, "PRIVATE": {}, "EVERYONE_ALLOWED": {} } }, "tags": [] }, "created_at": "2022-11-09T13:23:26.211891Z", "updated_at": "2022-11-09T13:23:26.211933Z", "content_version_name": "Security_trends_whitepaper_2022_with_Vienna", "is_active": true, "type": "DESKTOP", "content": 4214, "version": "f62592e0-8f78-46e2-887c-2f52716be127", "content_uuid": "f62592e0-8f78-46e2-887c-2f52716be127", "version_id": "f62592e0-8f78-46e2-887c-2f52716be127" }, "custom_events": [], "content_action": null, "content_stats": { "version": "f62592e0-8f78-46e2-887c-2f52716be127", "visitors_count": 1, "lifetime_visitors_count": 30, "last_seen": "2025-05-09T08:48:59Z", "last_updated": "2025-05-15T12:22:05Z", "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82" }, "content_meta_tags": { "url_title": "security-trends-whitepaper-2022", "title": "3 Key Trends in 2022", "description": "INVESTIGATIVE ANALYTICS DRIVING THE NEED FOR 3 KEY TRENDS IN 2022 ", "og_enabled": true, "seo_enabled": false, "version": "f62592e0-8f78-46e2-887c-2f52716be127" }, "keywords": [], "seo_content_version_name": "-cognyte-tl-3-key-trends-wp-en", "html_snippets": null, "is_live": true, "shorten": "https://engage.cognyte.com/s/28eb9f77/", "base_url": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7", "fonts": [ "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/Oswald-Regular_34.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/Oswald-Regular_3d.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/Oswald-Regular_4m.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/Oswald-Regular_4n.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/WorkSans-Regular_22.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/WorkSans-Regular_27.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/WorkSans-Regular_29.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/WorkSans-Regular_2f.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/WorkSans-Regular_2o.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/WorkSans-Regular_2r.woff", "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/fonts/WorkSans-Regular_2z.woff" ], "source_url": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7", "content_type": [], "created_at": "2022-11-09T13:23:25.343124Z", "updated_at": "2025-05-16T00:03:31.701894Z", "original_name": "Security_trends_whitepaper_2022_with_Vienna.pdf", "original_content_type": "application/pdf", "original_file_extension": "pdf", "original_file_size": 417451.0, "content_key": "users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7", "annotations": { "pages": [ { "page": 14, "annotations": [ { "type": "TextLink", "bounds": [ 69, 596, 365, 12 ], "action": { "type": "URI", "uri": "https://www.europol.europa.eu/socta/2017/drivers-of-crime.html" } }, { "type": "TextLink", "bounds": [ 72, 622, 465, 12 ], "action": { "type": "URI", "uri": "https://go.chainalysis.com/rs/503-FAP-074/images/2020-Crypto-Crime-Report.pdf" } }, { "type": "TextLink", "bounds": [ 72, 648, 610, 12 ], "action": { "type": "URI", "uri": "https://www.researchgate.net/publication/227273142_Devious_Chatbots_-_Interactive_Malware_with_a_Plot" } }, { "type": "TextLink", "bounds": [ 72, 674, 465, 12 ], "action": { "type": "URI", "uri": "https://www.fbi.gov/news/testimony/worldwide-threats-to-the-homeland-092420" } }, { "type": "TextLink", "bounds": [ 72, 700, 500, 12 ], "action": { "type": "URI", "uri": "https://info.claroty.com/the-critical-convergence-of-it-and-ot-security-in-a-global-crisis" } }, { "type": "TextLink", "bounds": [ 72, 778, 292, 12 ], "action": { "type": "URI", "uri": "https://www.seagate.com/our-story/data-age-2025/" } }, { "type": "TextLink", "bounds": [ 72, 804, 341, 12 ], "action": { "type": "URI", "uri": "https://www.idc.com/getdoc.jsp?containerId=prUS46286020" } }, { "type": "TextLink", "bounds": [ 77, 830, 651, 12 ], "action": { "type": "URI", "uri": "https://www.tampabay.com/news/military/macdill/SOCom-leader-wanted-to-toss-Google-exec-from-car-Because" } }, { "type": "TextLink", "bounds": [ 74, 874, 231, 12 ], "action": { "type": "URI", "uri": "https://fas.org/sgp/crs/natsec/R45178.pdf" } }, { "type": "TextLink", "bounds": [ 77, 900, 483, 12 ], "action": { "type": "URI", "uri": "https://fedtechmagazine.com/article/2018/12/cia-cio-sees-data-tip-spear-intelligence" } }, { "type": "TextLink", "bounds": [ 77, 926, 651, 12 ], "action": { "type": "URI", "uri": "https://www.theguardian.com/world/2020/nov/04/police-investigate-if-vienna-attacker-was-part-of-wider-network" } }, { "type": "TextLink", "bounds": [ 77, 952, 610, 12 ], "action": { "type": "URI", "uri": "https://ndupress.ndu.edu/Media/News/News-Article-View/Article/1566262/intelligence-in-a-data-driven-age" } }, { "type": "Link", "bounds": [ 70, 594, 362, 17 ], "objref": "42", "action": { "type": "URI", "uri": "https://www.europol.europa.eu/socta/2017/drivers-of-crime.htm" } }, { "type": "Link", "bounds": [ 72, 646, 610, 17 ], "objref": "43", "action": { "type": "URI", "uri": "https://www.researchgate.net/publication/227273142_Devious_Chatbots_-_Interactive_Malware_with_a_Plot" } }, { "type": "Link", "bounds": [ 74, 672, 466, 17 ], "objref": "44", "action": { "type": "URI", "uri": "https://www.fbi.gov/news/testimony/worldwide-threats-to-the-homeland-092420" } }, { "type": "Link", "bounds": [ 74, 698, 500, 17 ], "objref": "45", "action": { "type": "URI", "uri": "https://info.claroty.com/the-critical-convergence-of-it-and-ot-security-in-a-global-crisis" } }, { "type": "Link", "bounds": [ 74, 776, 297, 17 ], "objref": "46", "action": { "type": "URI", "uri": "https://www.seagate.com/our-story/data-age-2025/ " } }, { "type": "Link", "bounds": [ 74, 802, 345, 17 ], "objref": "47", "action": { "type": "URI", "uri": "https://www.idc.com/getdoc.jsp?containerId=prUS46286020 " } }, { "type": "Link", "bounds": [ 78, 828, 656, 17 ], "objref": "48", "action": { "type": "URI", "uri": "https://www.tampabay.com/news/military/macdill/SOCom-leader-wanted-to-toss-Google-exec-from-car-Because he-was-right-_167629195/" } }, { "type": "Link", "bounds": [ 77, 847, 147, 17 ], "objref": "49", "action": { "type": "URI", "uri": "https://www.tampabay.com/news/military/macdill/SOCom-leader-wanted-to-toss-Google-exec-from-car-Because he-was-right-_167629195/" } }, { "type": "Link", "bounds": [ 75, 873, 232, 17 ], "objref": "50", "action": { "type": "URI", "uri": "https://fas.org/sgp/crs/natsec/R45178.pdf" } }, { "type": "Link", "bounds": [ 77, 899, 484, 17 ], "objref": "51", "action": { "type": "URI", "uri": "https://fedtechmagazine.com/article/2018/12/cia-cio-sees-data-tip-spear-intelligence" } }, { "type": "Link", "bounds": [ 77, 924, 657, 17 ], "objref": "52", "action": { "type": "URI", "uri": "https://www.theguardian.com/world/2020/nov/04/police-investigate-if-vienna-attacker-was-part-of-wider-network " } }, { "type": "Link", "bounds": [ 77, 950, 611, 17 ], "objref": "53", "action": { "type": "URI", "uri": "https://ndupress.ndu.edu/Media/News/News-Article-View/Article/1566262/intelligence-in-a-data-driven-age" } }, { "type": "Link", "bounds": [ 55, 370, 122, 41 ], "objref": "54", "action": { "type": "URI", "uri": "https://www.cognyte.com/" } }, { "type": "Link", "bounds": [ 54, 362, 130, 55 ], "objref": "55", "action": { "type": "URI", "uri": "https://www.cognyte.com/contact/" } } ] } ] }, "config": { "pagecount": 14, "title": "", "author": "", "subject": "", "keywords": "", "creator": "Adobe InDesign 17.1 (Windows)", "producer": "Adobe PDF Library 16.0.5", "creationdate": "D:20220310101531+02'00'", "moddate": "D:20220310101537+02'00'", "trapped": "False", "fileName": "_4P8YdG7.pdf", "bounds": [ [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ] ], "bookmarks": [], "thumbnailType": "jpg", "pageType": "html", "pageLabels": [] }, "uuid": "f62592e0-8f78-46e2-887c-2f52716be127", "is_public": true, "description": "INVESTIGATIVE ANALYTICS DRIVING THE NEED FOR 3 KEY TRENDS IN 2022 ", "views_count": 148, "is_high_quality_thumbnails_available": true, "is_archived": false, "conversion_type": "DOCUMENT", "user": 557 }